Detecting shared or compromised credentials through analysis of simultaneous actions
    41.
    发明授权
    Detecting shared or compromised credentials through analysis of simultaneous actions 有权
    通过分析同步操作来检测共享或受损的凭据

    公开(公告)号:US09596249B2

    公开(公告)日:2017-03-14

    申请号:US14694647

    申请日:2015-04-23

    Abstract: A privileged account management system can detect when credentials used to access one or more servers have been shared or otherwise compromised. This detection can occur through analysis of simultaneous actions that are performed via multiple sessions associated with the same administrator. When two or more sessions associated with the same administrator are opened, the interactions performed over each of the sessions can be monitored to identify whether such interactions could be performed by a single administrator. If it is determined that the interactions over the multiple sessions could not reasonably be performed by a single administrator, various actions can be taken to address the possible breach to the security of the one or more servers.

    Abstract translation: 特权帐户管理系统可以检测用于访问一个或多个服务器的凭据是否已共享或以其他方式受到损害。 该检测可以通过分析通过与相同管理员相关联的多个会话执行的同时动作来进行。 当打开与同一个管理员关联的两个或更多个会话时,可以监视在每个会话上执行的交互,以确定这样的交互是否可以由单个管理员执行。 如果确定多个会话之间的交互无法由单个管理员合理执行,则可以采取各种措施来解决可能违反一个或多个服务器的安全性的操作。

    Systems and methods of reporting content-exposure events
    42.
    发明授权
    Systems and methods of reporting content-exposure events 有权
    报告内容曝光事件的系统和方法

    公开(公告)号:US09569626B1

    公开(公告)日:2017-02-14

    申请号:US14683513

    申请日:2015-04-10

    Abstract: In one embodiment, a method is performed by a computer system. The method includes discovering content in a user environment. The method further includes generating one or more content fingerprints on a per-content basis. The method also includes providing information sufficient to identify the one or more content fingerprints to a central computer system. Further, the method includes receiving a user selection of particular content stored in the user environment. In addition, the method includes requesting, from the central computer system, information related to a level of exposure of the particular content across a plurality of platforms and a plurality of users. Moreover, the method includes receiving exposure information for the particular content in response to the request. Additionally, the method includes publishing the exposure information to a user associated with the user environment.

    Abstract translation: 在一个实施例中,一种由计算机系统执行的方法。 该方法包括在用户环境中发现内容。 该方法还包括在每个内容的基础上产生一个或多个内容指纹。 该方法还包括向中央计算机系统提供足以识别一个或多个内容指纹的信息。 此外,该方法包括接收用户选择存储在用户环境中的特定内容。 此外,该方法包括从中央计算机系统请求与跨多个平台和多个用户的特定内容的曝光程度相关的信息。 此外,该方法包括响应于该请求而接收特定内容的曝光信息。 此外,该方法包括将曝光信息发布到与用户环境相关联的用户。

    READ-AHEAD ON SIGNED CONNECTIONS WITH UNSIGNING, INLINE, TRANSPARENT PROXIES
    43.
    发明申请
    READ-AHEAD ON SIGNED CONNECTIONS WITH UNSIGNING, INLINE, TRANSPARENT PROXIES 审中-公开
    阅读前瞻与注意,联机,透明代码的签名连接

    公开(公告)号:US20170041431A1

    公开(公告)日:2017-02-09

    申请号:US14821635

    申请日:2015-08-07

    Inventor: Samuel Liddicott

    CPC classification number: H04L67/28 H03M7/3088 H04L67/2828 H04L69/04

    Abstract: Innovative technologies for reducing network request response times over a server-signed connection are disclosed. The technologies may involve dynamically computing synchronized compression dictionaries using server responses to speculative or “read-ahead” client requests. The technologies operate even when the client is unable to accept the server responses due to server-signing constraints. A server proxy may receive a read-ahead request originating from a client proxy. After receiving a response to the read-ahead request from a server, the server proxy may populate a compression dictionary and forward the read-ahead request to the client proxy. The client proxy may populate its own synchronized compression dictionary using the forwarded read-ahead response. The server proxy and client proxy may use the compression dictionaries to respectively compress and decompress a response to an actual client request that matches or is highly similar to the earlier response to the read-ahead request.

    Abstract translation: 披露了通过服务器签名连接减少网络请求响应时间的创新技术。 这些技术可能涉及使用对投机或“预读”客户端请求的服务器响应动态计算同步压缩字典。 即使客户端由于服务器签名限制而无法接受服务器响应,这些技术也会运行。 服务器代理可以接收来自客户机代理的预读请求。 在从服务器接收到对预读请求的响应之后,服务器代理可以填充压缩字典并将预读请求转发给客户端代理。 客户端代理可以使用转发的预读响应填充其自己的同步压缩字典。 服务器代理和客户端代理可以使用压缩字典来分别压缩和解压缩对与预读请求的较早响应相匹配或高度相似的实际客户端请求的响应。

    "> DETERMINE CONFIDENCE OF MAIL ARCHIVE OWNERSHIP FROM SENDERS IN
    45.
    发明申请
    DETERMINE CONFIDENCE OF MAIL ARCHIVE OWNERSHIP FROM SENDERS IN "SENT ITEMS" FOLDER 审中-公开
    确定邮件存档在“发件品”文件夹中的发件人所有权

    公开(公告)号:US20160357735A1

    公开(公告)日:2016-12-08

    申请号:US14731283

    申请日:2015-06-04

    CPC classification number: G06F16/214 H04L51/22

    Abstract: A method for determining mail archive ownership during data migration is described. The method is performed by a Migration Manager that is capable of generating a list of possible owners based on confidence level. The confidence level is obtained by scanning various messages associated with the mail archive and determining a frequency of appearance a particular user name (e.g., e-mail address) appears compared to the total number of messages scanned. The generated list of possible owners can subsequently be used to determine/confirm the owner of the mail archive. Confirmation may be required before the data migration is completed.

    Abstract translation: 描述了在数据迁移期间确定邮件归档所有权的方法。 该方法由迁移管理器执行,该管理器能够基于置信级别生成可能的所有者列表。 通过扫描与邮件存档相关联的各种消息并且确定与所扫描的消息的总数相比出现特定用户名(例如,电子邮件地址)的出现频率来获得置信水平。 生成的可能的所有者列表随后可用于确定/确认邮件归档的所有者。 在数据迁移完成之前可能需要进行确认。

    MIGRATE NICKNAME CACHE FOR EMAIL SYSTEMS AND DEVICES

    公开(公告)号:US20160357438A1

    公开(公告)日:2016-12-08

    申请号:US14731278

    申请日:2015-06-04

    CPC classification number: G06F3/0604 G06F3/0647 G06F3/0683

    Abstract: A method for migrating a nickname cache via a migration manager is described. The method includes the migration manager locating where the nickname cache is stored and locating where the nickname cache is to be migrated. Once the source and target devices are located, the migration manager can generate any necessary transformations so that the data migrated from the source device to the target device is compatible. The nickname cache can then be extracted from the source device, transformed and stored into the nickname cache of the target device.

    Abstract translation: 描述了通过迁移管理器迁移昵称缓存的方法。 该方法包括迁移管理器定位昵称高速缓存的存储位置,并定位昵称缓存要迁移的位置。 一旦找到源和目标设备,迁移管理器就可以生成任何必要的转换,以便从源设备迁移到目标设备的数据是兼容的。 然后可以从源设备提取昵称高速缓存,转换并存储到目标设备的昵称高速缓存中。

    Time zero classification of messages
    47.
    发明授权
    Time zero classification of messages 有权
    消息的时间零分类

    公开(公告)号:US09516047B2

    公开(公告)日:2016-12-06

    申请号:US15133824

    申请日:2016-04-20

    Abstract: Detecting infectious messages comprises performing an individual characteristic analysis of a message to determine whether the message is suspicious, determining whether a similar message has been noted previously in the event that the message is determined to be suspicious, classifying the message according to its individual characteristics and its similarity to the noted message in the event that a similar message has been noted previously.

    Abstract translation: 检测感染性消息包括执行消息的单独特征分析以确定消息是否是可疑的,确定在消息被确定为可疑的情况下是否先前已经记录了类似的消息,根据其个体特征对该消息进行分类,以及 在之前已经注意到类似的消息的情况下,其与所述消息的相似性。

    CONTENT-BASED ENCRYPTION KEYS
    48.
    发明申请
    CONTENT-BASED ENCRYPTION KEYS 有权
    基于内容的加密密钥

    公开(公告)号:US20160352511A1

    公开(公告)日:2016-12-01

    申请号:US14722854

    申请日:2015-05-27

    Abstract: Techniques and mechanisms described herein facilitate the encryption of content using content-based encryption keys. According to various embodiments, data stream may include one or more data chunks. A client machine may apply a hash function to a data chunk to determine a fingerprint value. A cryptographic protocol shared with a remote server may be applied to the fingerprint value to determine a data chunk encryption key. The data chunk encryption key may be used to encrypt the data chunk, and the encrypted data chunk may be sent to the remote server for storage.

    Abstract translation: 这里描述的技术和机制有助于使用基于内容的加密密钥来加密内容。 根据各种实施例,数据流可以包括一个或多个数据块。 客户端机器可以将哈希函数应用于数据块以确定指纹值。 可以将与远程服务器共享的加密协议应用于指纹值以确定数据块加密密钥。 数据块加密密钥可以用于加密数据块,并且可以将加密的数据块发送到远程服务器进行存储。

    Active e-mail filter with challenge-response

    公开(公告)号:US09503406B2

    公开(公告)日:2016-11-22

    申请号:US14637315

    申请日:2015-03-03

    Inventor: Brian Wilson

    CPC classification number: H04L51/12 G06Q10/107 H04L51/22

    Abstract: When a user receives potential junk e-mail from an unknown sender address, an active filter installed in or cooperating with the user's e-mail system sends a challenge e-mail back to the sender address. Unless the user receives a correct response e-mail from the sender address and/or a response that meets formal criteria, the active filter rejects the original e-mail and blocks future e-mail from that sender address. The challenge preferably includes a question that the sender must correctly answer in his response. The question is such that only humans can interpret and respond to it correctly. For example, the question may relate to and/or be incorporated in an image in the challenge. Lists of approved and blocked sender addresses are compiled. The user may directly enter addresses in the address lists. Addresses to which the user has sent e-mail may also be included directly in the approved list.

Patent Agency Ranking